PatchSiren cyber security CVE debrief
CVE-2026-41999 PowerDNS CVE debrief
CVE-2026-41999 was published on 2026-05-21 and describes incorrect behavior of views when handling TCP PROXY requests. The available corpus is limited, but the NVD record links to an official PowerDNS advisory, so PowerDNS appears to be the likely affected project while the vendor attribution remains low confidence. The NVD-assigned CVSS vector indicates network exposure with low confidentiality and integrity impact, no availability impact, and high attack complexity.
- Vendor
- PowerDNS
- Product
- Authoritative
- CVSS
- MEDIUM 4.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-21
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-21
- Advisory updated
- 2026-05-21
Who should care
Administrators and operators who use DNS views and accept TCP PROXY protocol traffic should review this issue, especially in environments running the referenced PowerDNS software. Security teams should also pay attention if their deployments rely on source-IP-based policy decisions or view segregation.
Technical summary
The source corpus only confirms that the flaw involves incorrect view behavior when TCP PROXY requests are processed. NVD lists CVSS 3.1 AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N, which suggests a remotely reachable issue with limited confidentiality and integrity impact and no availability impact. No exploit details, affected versions, or patch-specific instructions were present in the supplied sources.
Defensive priority
Medium. The severity score is moderate, but the issue may matter operationally if your DNS policy or client classification depends on views and PROXY-protocol-aware traffic handling.
Recommended defensive actions
- Check whether you run PowerDNS authoritative deployments that use views and TCP PROXY requests.
- Review the referenced PowerDNS security advisory for affected versions and fixes.
- Apply vendor updates or mitigations as soon as they are available for your deployment.
- Validate that any source-IP or view-based access policies still behave as expected after patching.
- Monitor for anomalous DNS responses or policy-routing behavior in environments that rely on views.
Evidence notes
Source evidence is limited to the NVD record and its reference to the official PowerDNS advisory. NVD metadata shows vulnStatus "Received" and the CVSS vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N. The corpus did not include affected version ranges, CPE data, exploit details, or a confirmed vendor/product mapping beyond the PowerDNS advisory link, so vendor attribution remains low confidence.
Official resources
-
CVE-2026-41999 CVE record
CVE.org
-
CVE-2026-41999 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
Published on 2026-05-21. The source corpus does not include a separate vendor advisory publication date beyond the linked advisory reference, so this debrief uses the CVE/NVD publication time only.